Email compromises are becoming more and more dangerous every year, and it’s important to know how they work. 

Email Compromises involve the hacking of a company or personal email address with the intent to impersonate an individual or company. A hacker impersonating a trusted source could steal financial information, sensitive customer data, or trade secrets.

How do they steal email addresses?

The easiest way a hacker will steal an email address to impersonate someone is through a spear phishing attack. It could be a fake web page, a fake email, or even a fake phone call, but somehow the hacker will get a hold of their targets email account username and password.

Who do they impersonate?

If a hacker can’t get to you directly, the easiest way to steal from you or your company is by impersonating someone in a high level position at your company or a trusted vendor/supplier.

If it’s an important person at your own company, usually the email will demand you send over wire transfer information right away. The hacker is hoping that you will fall for this scam because it is an urgent request from someone with authority over you.

If it’s a vendor/supplier, a hacker will usually request a copy of an invoice or similar document with financial information on it. They may say they need to send over a payment and ask for the company’s banking information.

How Can I Protect My Business?

They best way to protect your business from these type of attacks is to implement a recurring cyber security training plan. Knowing the signs of a threat and following up with the correct response is critical for the life of your business.


Sign Up to Our Newsletter
For the Latest News and Tips


If your company is like many organizations, your IT infrastructure progressed over time, trying to keep up with the pace of your business. Without the right kind of IT planning and careful technology management all along, your technical environment probably has gaps.

Our IT assessments provide a clear picture of your current IT infrastructure and operations. Whether faced with budget shortfalls, limited resources, aging infrastructure or an outdated strategy, our detailed assessment reports provide relevant findings and recommendations to spur meaningful organizational change.

NetConnect provides comprehensive assessments of both IT infrastructure and IT operations. Our IT infrastructure assessments evaluate all major infrastructure components, including servers, storage networks, security, desktop infrastructure, end-device hardware and applications. Our IT operations assessments evaluate critical operational areas, such as IT strategic planning, IT staffing, IT operational processes, IT governance, IT vendor management and IT support.